pull down to refresh
0 sats \ 0 replies \ @bitcoin_devs OP 27 Mar \ on: Dust Attack explained bitcoin
nearly 30% of all the UTXOs have a value of 546 sats
(from w_s_bitcoin on X)

The issue actually starts with Alice, as she sends Tx1 with a very low fee. However, Carol (the attacker) exploits this situation further by creating Tx2, a large child transaction with an extremely low fee, which brings down the fee rate of the whole package.
Without Carol's interference, Alice’s Tx1 might get confirmed if someone uses a CPFP method.
In short, Carol’s actions as the attacker are what turn this into a pinning attack.
Based on https://mempool.space/graphs/mining/pools they currently control approximately 32.58%
It generally help detect typos/errors in an address but does not verify whether the address is actually in use or belongs to anyone. If you generate a valid Bitcoin address but never use it, BTC sent to that address will be lost forever
Thanks, glad to hear that!
We're actively improving the website with new resources and tools. If there's a tool you'd like to see or wish existed and want us to build, lmk
10 sats \ 0 replies \ @bitcoin_devs OP 8 Feb \ parent \ on: 1- How to Sign a Segwit Transaction bitcoin
we will post the whole series in future posts.
As Satsie said, you can check the whole series at this link for now: https://bitcoindevs.xyz/decoding/transaction-signing